Secure Conference Key Distribution Schemes for Conspiracy Attack

doi 10.1007/3-540-47555-9_37
Full Text
Abstract

Available in full text

Date

Unknown

Authors
Publisher

Springer Berlin Heidelberg